Honeypots provide a critical intelligence window into adversarial behavior and goals. Deploying and managing honeypots can be daunting, but leveraging data gathered from honeypots can prove invaluable in threat modeling and intelligent defense. This presentation will discuss a number of different types of honeypots, from virtual honey nets to honey tokens, their uses, and value. Discussion will also cover data gathering and analysis techniques to ensure the greatest value from your honeypot deployment. Decisions to implement honeypots should be guided by careful consideration with respect to threat models, intelligence requirements, and staff availability. Understanding the honeypot landscape will help an organization to make value driven choices about what technology to employ and how to best ingest tactical data from honeypots to make strategic decisions.